load balancer

Posted on 2011-04-19
Last Modified: 2012-05-11
Hi ,
 i just wonder what is the disadvantages of persistent load balancing technique? tks a lot.
Question by:BeginToLearn
    LVL 11

    Accepted Solution

    Can you possibly give a little more details? What device are you using to load balance?  Usually WAN sided  load balancing is configured on a firewall/router that has two separate WAN ports from separate ISP's where the router will determine by network bandwidth what inbound and outbound traffic should be sent to which WAN address.  In WAN load balancing it is also used as a failover in the case one of the ISP circuits goes down all traffic will be passed to the other WAN IP.

    Then via managed LAN switches you can have internal network traffic that is load balanced specific to your network.  I am not sure what type of load balance you are referring to.   I can't think of a situation where load balancing would be a bad thing, it just depends on how you are attempting to use it.

    Author Comment

    I don't use any device. I am just doing research about it as the technique to implement network load balancer. . I can find it advantages easily, but disadvantages are hard. Maybe server down but the cache still keep it as active ...
    LVL 9

    Assisted Solution

    Unless you give too little bandwidth to this critcal service, or that service. When setup correctly there should not be any disadvantages.

    Author Comment

    last night, i wrote this on my research

    Disadvantages: This technique has a problem with automatic failover in which a down or inactive server will cause information of per-session becomes disappeared and inaccessible. Consequently, any session depend on it will be lost.  

    I mean compare to other technique in load balancing  with the same other factors, what are the drawbacks of the technique ? tks.  

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Suggested Solutions

    Title # Comments Views Activity
    Drive configuration in HP DL380 Gen 9 10 68
    Keyboard 4 68
    X3650_M5 Warning Vsphere 5 48
    Cisco 2921 WIC card 2 35
    Hyper-convergence systems have taken the IT world by storm and have quickly started to change our point of view of how the data center should and could be architected. In this article, I’ll explain the benefits of employing a hyper-converged system …
    #Citrix #Citrix Netscaler #HTTP Compression #Load Balance
    Internet Business Fax to Email Made Easy - With eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now